[PATCH] Fix typos in comments

Vladimir D. Seleznev vseleznv at altlinux.org
Fri Dec 13 17:30:45 UTC 2019


io.c (tprint_iov_upto): Fix typo in the function header comment.
tests/tests.h (f8ill_ptr_to_kulong): Likewise.
printsiginfo.c (print_si_info): Fix typo in the comment.
stage_output.c (strace_open_memstream): Likewise.
tests/prctl-seccomp-strict.c (main): Likewise.
tests/seccomp-strict.c (main): Likewise.
largefile_wrappers.h: Fix typos in the file header comment.
tests/zeroargc.c: Fix typo in the file header comment.
---
 io.c                         | 2 +-
 largefile_wrappers.h         | 2 +-
 printsiginfo.c               | 2 +-
 stage_output.c               | 2 +-
 tests/prctl-seccomp-strict.c | 2 +-
 tests/seccomp-strict.c       | 2 +-
 tests/tests.h                | 2 +-
 tests/zeroargc.c             | 2 +-
 8 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/io.c b/io.c
index 4fd6cf06d..c963cfbd1 100644
--- a/io.c
+++ b/io.c
@@ -90,7 +90,7 @@ print_iovec(struct tcb *tcp, void *elem_buf, size_t elem_size, void *data)
 
 /*
  * data_size limits the cumulative size of printed data.
- * Example: recvmsg returing a short read.
+ * Example: recvmsg returning a short read.
  */
 void
 tprint_iov_upto(struct tcb *const tcp, const kernel_ulong_t len,
diff --git a/largefile_wrappers.h b/largefile_wrappers.h
index b52e22189..116e7048a 100644
--- a/largefile_wrappers.h
+++ b/largefile_wrappers.h
@@ -1,6 +1,6 @@
 /*
  * Wrappers for handling discrepancies in LF64-themed syscalls availability and
- * necessity between verious architectures and kernel veriosns.
+ * necessity between various architectures and kernel versions.
  *
  * Copyright (c) 2012-2019 The strace developers.
  * All rights reserved.
diff --git a/printsiginfo.c b/printsiginfo.c
index 24f5dd7cd..011b7d5ce 100644
--- a/printsiginfo.c
+++ b/printsiginfo.c
@@ -172,7 +172,7 @@ print_si_info(const siginfo_t *sip)
 #ifdef HAVE_SIGINFO_T_SI_SYSCALL
 		case SIGSYS: {
 			/*
-			 * Note that we can safely use the personlity set in
+			 * Note that we can safely use the personality set in
 			 * current_personality  here (and don't have to guess it
 			 * based on X32_SYSCALL_BIT and si_arch, for example):
 			 *  - The signal is delivered as a result of seccomp
diff --git a/stage_output.c b/stage_output.c
index d9d0352bb..3bfbdba7d 100644
--- a/stage_output.c
+++ b/stage_output.c
@@ -37,7 +37,7 @@ strace_open_memstream(struct tcb *tcp)
 	 */
 	fflush(fp);
 
-	/* Store the FILE pointer for later restauration. */
+	/* Store the FILE pointer for later restoration. */
 	tcp->staged_output_data->real_outf = tcp->outf;
 	tcp->outf = fp;
 #endif
diff --git a/tests/prctl-seccomp-strict.c b/tests/prctl-seccomp-strict.c
index b66d287d8..8fdabcc7c 100644
--- a/tests/prctl-seccomp-strict.c
+++ b/tests/prctl-seccomp-strict.c
@@ -37,7 +37,7 @@ main(void)
 		rc = 0;
 	} else {
 		/*
-		 * If kernel implementaton of SECCOMP_MODE_STRICT is buggy,
+		 * If kernel implementation of SECCOMP_MODE_STRICT is buggy,
 		 * the following syscall will result to SIGKILL.
 		 */
 		rc = write(1, text1, LENGTH_OF(text1)) != LENGTH_OF(text1);
diff --git a/tests/seccomp-strict.c b/tests/seccomp-strict.c
index 79da37050..fcf30e540 100644
--- a/tests/seccomp-strict.c
+++ b/tests/seccomp-strict.c
@@ -38,7 +38,7 @@ main(void)
 		rc = 0;
 	} else {
 		/*
-		 * If kernel implementaton of SECCOMP_MODE_STRICT is buggy,
+		 * If kernel implementation of SECCOMP_MODE_STRICT is buggy,
 		 * the following syscall will result to SIGKILL.
 		 */
 		rc = write(1, text1, LENGTH_OF(text1)) != LENGTH_OF(text1);
diff --git a/tests/tests.h b/tests/tests.h
index d47e5bd34..1ff491570 100644
--- a/tests/tests.h
+++ b/tests/tests.h
@@ -294,7 +294,7 @@ unsigned int ifindex_lo(void);
 /*
  * For 64-bit kernel_ulong_t and 32-bit pointer,
  * return a kernel_ulong_t value by filling higher bits.
- * For other architertures, return the original pointer.
+ * For other architectures, return the original pointer.
  */
 static inline kernel_ulong_t
 f8ill_ptr_to_kulong(const void *const ptr)
diff --git a/tests/zeroargc.c b/tests/zeroargc.c
index 672959c42..5602af69c 100644
--- a/tests/zeroargc.c
+++ b/tests/zeroargc.c
@@ -1,5 +1,5 @@
 /*
- * Execute an executable with zero argc and specified anvironment.
+ * Execute an executable with zero argc and specified environment.
  *
  * Copyright (c) 2017-2018 Dmitry V. Levin <ldv at altlinux.org>
  * All rights reserved.
-- 
2.24.0



More information about the Strace-devel mailing list